File name:

A653D1951B3DE7E0EDE77758187763B0.exe

Full analysis: https://app.any.run/tasks/dc9163c9-4a91-46ab-bb62-897b37d3d867
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: March 25, 2025, 04:02:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
nanocore
rat
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A653D1951B3DE7E0EDE77758187763B0

SHA1:

06DF3427AA544488543152111F5C5CFC52D41463

SHA256:

21F3851DF5C3487B850C88275818072EB000857423F72608B0708B53BB3BBF64

SSDEEP:

98304:I6bXDBsQZa9fvSrpBZuYAtmN+KQ9QiD5AeT8WJz+jyaKaFE5FUgNWz+0LEmc3UOC:L0IY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NANOCORE has been detected (SURICATA)

      • 3377.exe (PID: 6620)
      • ksmj.ddns.net.exe (PID: 4244)
    • NANOCORE has been detected (YARA)

      • ksmj.ddns.net.exe (PID: 4244)
      • 3377.exe (PID: 6620)
    • Connects to the CnC server

      • 3377.exe (PID: 6620)
      • ksmj.ddns.net.exe (PID: 4244)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
    • Reads security settings of Internet Explorer

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
    • Connects to unusual port

      • 3377.exe (PID: 6620)
      • ksmj.ddns.net.exe (PID: 4244)
    • Contacting a server suspected of hosting an CnC

      • ksmj.ddns.net.exe (PID: 4244)
      • 3377.exe (PID: 6620)
  • INFO

    • Reads the machine GUID from the registry

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • ksmj.ddns.net.exe (PID: 4244)
      • 3377.exe (PID: 6620)
      • Blandly Rootkit.exe (PID: 4976)
      • R00tkit Blandly.exe (PID: 6744)
    • Reads the computer name

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
      • Blandly Rootkit.exe (PID: 4976)
      • 3377.exe (PID: 6620)
      • ksmj.ddns.net.exe (PID: 4244)
    • Checks supported languages

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • 3377.exe (PID: 6620)
      • R00tkit Blandly.exe (PID: 6744)
      • ksmj.ddns.net.exe (PID: 4244)
      • Blandly Rootkit.exe (PID: 4976)
    • Create files in a temporary directory

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
      • Blandly Rootkit.exe (PID: 4976)
    • Process checks computer location settings

      • A653D1951B3DE7E0EDE77758187763B0.exe (PID: 4776)
      • R00tkit Blandly.exe (PID: 6744)
    • Process checks whether UAC notifications are on

      • ksmj.ddns.net.exe (PID: 4244)
      • 3377.exe (PID: 6620)
    • Creates files or folders in the user directory

      • ksmj.ddns.net.exe (PID: 4244)
    • Reads Environment values

      • Blandly Rootkit.exe (PID: 4976)
    • Disables trace logs

      • Blandly Rootkit.exe (PID: 4976)
    • Checks proxy server information

      • Blandly Rootkit.exe (PID: 4976)
      • slui.exe (PID: 5756)
    • Reads the software policy settings

      • Blandly Rootkit.exe (PID: 4976)
      • slui.exe (PID: 5756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Nanocore

(PID) Process(6620) 3377.exe
BuildTime2025-03-11 20:35:10.091792
Version1.2.2.0
Mutexf761c1a4-b3fc-47bd-8557-06047cdf0973
DefaultGroupDefault
PrimaryConnectionHost
BackupConnectionHostksmj.ddns.net
ConnectionPort5552
RunOnStartupFalse
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
(PID) Process(4244) ksmj.ddns.net.exe
BuildTime2025-03-11 19:29:43.766992
Version1.2.2.0
Mutexb73dccc0-ae28-411e-8f12-dcb30e5628a2
DefaultGroupDefault
PrimaryConnectionHostksmj.ddns.net
BackupConnectionHostksmj.ddns.net
ConnectionPort1337
RunOnStartupFalse
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:11 20:37:02+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 3130368
InitializedDataSize: 7680
UninitializedDataSize: -
EntryPoint: 0x2fe23e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: R00tkit.exe
LegalCopyright:
OriginalFileName: R00tkit.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start a653d1951b3de7e0ede77758187763b0.exe #NANOCORE 3377.exe #NANOCORE ksmj.ddns.net.exe r00tkit blandly.exe blandly rootkit.exe svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4244"C:\Users\admin\AppData\Local\Temp\ksmj.ddns.net.exe" C:\Users\admin\AppData\Local\Temp\ksmj.ddns.net.exe
A653D1951B3DE7E0EDE77758187763B0.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ksmj.ddns.net.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Nanocore
(PID) Process(4244) ksmj.ddns.net.exe
BuildTime2025-03-11 19:29:43.766992
Version1.2.2.0
Mutexb73dccc0-ae28-411e-8f12-dcb30e5628a2
DefaultGroupDefault
PrimaryConnectionHostksmj.ddns.net
BackupConnectionHostksmj.ddns.net
ConnectionPort1337
RunOnStartupFalse
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
4776"C:\Users\admin\Desktop\A653D1951B3DE7E0EDE77758187763B0.exe" C:\Users\admin\Desktop\A653D1951B3DE7E0EDE77758187763B0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\a653d1951b3de7e0ede77758187763b0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4976"C:\Users\admin\AppData\Local\Temp\Blandly Rootkit.exe" C:\Users\admin\AppData\Local\Temp\Blandly Rootkit.exe
R00tkit Blandly.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Phantom
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\blandly rootkit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5756C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6620"C:\Users\admin\AppData\Local\Temp\3377.exe" C:\Users\admin\AppData\Local\Temp\3377.exe
A653D1951B3DE7E0EDE77758187763B0.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\3377.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Nanocore
(PID) Process(6620) 3377.exe
BuildTime2025-03-11 20:35:10.091792
Version1.2.2.0
Mutexf761c1a4-b3fc-47bd-8557-06047cdf0973
DefaultGroupDefault
PrimaryConnectionHost
BackupConnectionHostksmj.ddns.net
ConnectionPort5552
RunOnStartupFalse
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
6744"C:\Users\admin\AppData\Local\Temp\R00tkit Blandly.exe" C:\Users\admin\AppData\Local\Temp\R00tkit Blandly.exe
A653D1951B3DE7E0EDE77758187763B0.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\r00tkit blandly.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
9 197
Read events
9 183
Write events
14
Delete events
0

Modification events

(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4976) Blandly Rootkit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Blandly Rootkit_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4776A653D1951B3DE7E0EDE77758187763B0.exeC:\Users\admin\AppData\Local\Temp\3377.exeexecutable
MD5:0E013A4DB9F8352623A4EAA401D1911D
SHA256:0AFBFA4A8F94EF9204F6E19B8E65BB68A74795745F2D8C996AFFFAA44F4A2908
4244ksmj.ddns.net.exeC:\Users\admin\AppData\Roaming\BB926E54-E3CA-40FD-AE90-2764341E7792\run.dattext
MD5:7D4C2D3BDCF96E9F365D44A61E458C58
SHA256:FA740301C16E9A3E5E2244D72EEA41E8B93233B29A18498DA75751C8D16539BE
4776A653D1951B3DE7E0EDE77758187763B0.exeC:\Users\admin\AppData\Local\Temp\ksmj.ddns.net.exeexecutable
MD5:E2557F03A5D4DE545313BA77DE25139E
SHA256:CFD8EE211B76DB67B79ED33DDCE0BC60EC697E8E1E1162A02543188587760B56
4776A653D1951B3DE7E0EDE77758187763B0.exeC:\Users\admin\AppData\Local\Temp\R00tkit Blandly.exeexecutable
MD5:B66E88BA098DA4D287B2DD99F69D14EF
SHA256:105FEE6FB5D6119C586844D5B7CEAA27B86C8ACE1B8C2C30EAEA51EB55C7B115
4976Blandly Rootkit.exeC:\Users\admin\AppData\Local\Temp\bin\latestversiontext
MD5:F619991470DF8B3A8AD907BE8BC5FBD4
SHA256:7F98E71C92F0055050A542C8A53E348320C6812CBFE33C12C53C1B153080A2B8
6744R00tkit Blandly.exeC:\Users\admin\AppData\Local\Temp\Blandly Rootkit.exeexecutable
MD5:302E8CD3926E071313C59CB2AD1D1D79
SHA256:984360F867C1891F7EA6293AC2F72907321D1BCC4E68184327DAD522744C97A5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
31
DNS requests
112
Threats
112

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5304
RUXIMICS.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
GET
200
140.82.121.4:443
https://raw.githubusercontent.com/C5Hackr/Phantom/main/version
unknown
text
7 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
unknown
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5304
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
unknown
2104
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5304
RUXIMICS.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
4976
Blandly Rootkit.exe
185.199.111.133:443
raw.githubusercontent.com
FASTLY
US
unknown
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6620
3377.exe
169.150.202.83:5552
ksmj.ddns.net
Datacamp Limited
IL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
unknown
google.com
  • 216.58.206.78
unknown
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
unknown
ksmj.ddns.net
  • 169.150.202.83
unknown
raw.githubusercontent.com
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.108.133
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
unknown

Threats

PID
Process
Class
Message
6620
3377.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
6620
3377.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
4244
ksmj.ddns.net.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
No debug info